Cybersecurity : Technology and Governance (2024)

個数:

Cybersecurity : Technology and Governance (2024)

  • 提携先の海外書籍取次会社に在庫がございます。通常約2週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 437 p.
  • 言語 ENG
  • 商品コード 9783031684821

Full Description

This book gives a complete introduction to cybersecurity and its many subdomains. It's unique by covering both technical and governance aspects of cybersecurity and is 

easy to read with 150 full color figures. There are also exercises and study cases at the end of each chapter, with additional material on the book's website.

The numerous high-profile cyberattacks being reported in the press clearly show that cyberthreats cause serious business risks. For this reason, cybersecurity has become a critical concern for global politics, national security, organizations as well for individual citizens. While cybersecurity has traditionally been a technological discipline, the field has grown so large and complex that proper governance of cybersecurity is needed.

The primary audience for this book is advanced level students in computer science focusing on cybersecurity and cyber risk governance. The digital transformation of society also makes cybersecurity relevant in many other disciplines, hence this book is a useful resource for other disciplines, such as law, business management and political science. Additionally, this book is for anyone in the private or public sector, who wants to acquire or update their knowledge about cybersecurity both from a technological and governance perspective.

 

Contents

Chapter 1 Basic concepts of cybersecurity.- Chapter 2 Attack vectors and malware.- Chapter 3 System security.- Chapter 4 Cryptography.- Chapter 5 Key management and PKI.- Chapter 6 Network security.- Chapter 7 Wireless Security.- Chapter 8 User authentication.- Chapter 9 IAM - Identity and Access Management.- Chapter 10 Digital Privacy.- Chapter 11Secure by design.- Chapter 12 Physical Information Security.- Chapter 13 Security culture.- Chapter 14 Cybersecurity readiness, security testing and audit.- Chapter 15 AI and cybersecurity.- Chapter 16Cyber operations.- Chapter 17 Cyber organizational structures and regulation.- Chapter 18 Governance and information security management.- Chapter 19 Cybersecurity risk management.

最近チェックした商品